Escolar Documentos
Profissional Documentos
Cultura Documentos
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
http://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (1110R)
© 2017 Cisco Systems, Inc. All rights reserved.
CONTENTS
PREFACE Preface xi
Audience xi
Conventions xi
Related Cisco UCS Documentation xiii
CHAPTER 1 Overview 1
Cisco UCS E-Series Servers and the Cisco UCS E-Series Network Compute Engine Overview 1
Server Software 2
Cisco Integrated Management Controller 3
Overview of the Cisco IMC User Interface 5
Cisco IMC Home Page 5
Navigation and Work Panes 5
Toolbar 8
Cisco Integrated Management Controller Online Help Overview 8
Logging into Cisco IMC 8
Logging out of Cisco IMC 9
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
iii
Contents
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
iv
Contents
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
v
Contents
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
vi
Contents
Network Security 98
Configuring Network Security 98
Network Time Protocol Settings 99
Network Time Protocol Service Setting 99
Configuring Network Time Protocol Settings 99
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
vii
Contents
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
viii
Contents
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
ix
Contents
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
x
Preface
This preface includes the following sections:
• Audience, on page xi
• Conventions, on page xi
• Related Cisco UCS Documentation, on page xiii
Audience
This guide is intended primarily for data center administrators with responsibilities and expertise in one or
more of the following:
• Server administration
• Storage administration
• Network administration
• Network security
Conventions
Text Type Indication
GUI elements GUI elements such as tab titles, area names, and field labels appear in this font.
Main titles such as window, dialog box, and wizard titles appear in this font.
TUI elements In a Text-based User Interface, text the system displays appears in this font.
System output Terminal sessions and information that the system displays appear in this
font.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
xi
Preface
Preface
string A nonquoted set of characters. Do not use quotation marks around the string or
the string will include the quotation marks.
!, # An exclamation point (!) or a pound sign (#) at the beginning of a line of code
indicates a comment line.
Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the
document.
Tip Means the following information will help you solve a problem. The tips information might not be
troubleshooting or even an action, but could be useful information, similar to a Timesaver.
Timesaver Means the described action saves time. You can save time by performing the action described in the paragraph.
Caution Means reader be careful. In this situation, you might perform an action that could result in equipment damage
or loss of data.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
xii
Preface
Related Cisco UCS Documentation
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
xiii
Preface
Related Cisco UCS Documentation
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
xiv
CHAPTER 1
Overview
This chapter includes the following sections:
• Cisco UCS E-Series Servers and the Cisco UCS E-Series Network Compute Engine Overview, on page
1
• Server Software, on page 2
• Cisco Integrated Management Controller, on page 3
• Overview of the Cisco IMC User Interface, on page 5
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
1
Overview
Server Software
Note • The EHWIC E-Series NCE can be installed in the the Cisco ISR G2 only.
• The NIM E-Series NCE can be installed in the Cisco ISR 4000 series only.
• The Cisco ISR 4331 has one SM slot. The Cisco ISR 4321 and the Cisco ISR 4431 have no SM slots.
• Citrix XenServer is supported on the E-Series Servers only.
• Cisco UCS-E160S-M3/K9, UCS-E180D-M3/K9, and UCS-E1120D-M3/K9 servers are supported on
the ISR 4000 series only.
• CIMC 3.2.x is not supported on EHWIC NCEs.
Note For information about the supported E-Series Servers and NCE, and the maximum number of servers that can
be installed per router, see the "Hardware Requirements" section in the Hardware Installation Guide for Cisco
UCS E-Series Servers and the Cisco UCS E-Series Network Compute Engine.
Server Software
E-Series Servers and NCE require three major software systems:
• CIMC firmware
• BIOS firmware
• Operating system or hypervisor
CIMC Firmware
Cisco Integrated Management Controller (CIMC) is a separate management module built into the motherboard
of the E-Series Server or NCE. A dedicated ARM-based processor, separate from the main server CPU, runs
the CIMC firmware. The system ships with a running version of the CIMC firmware. You can update the
CIMC firmware, but no initial installation is needed.
CIMC is the management service for the E-Series Servers and NCE. You can use a web-based GUI or
SSH-based CLI to access, configure, administer, and monitor the server.
BIOS Firmware
BIOS initializes the hardware in the system, discovers bootable devices, and boots them in the provided
sequence. It boots the operating system and configures the hardware for the operating system to use. BIOS
manageability features allow you to interact with the hardware and use it. In addition, BIOS provides options
to configure the system, manage firmware, and create BIOS error reports.
The system ships with a running version of the BIOS firmware. You can update the BIOS firmware, but no
initial installation is needed.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
2
Overview
Cisco Integrated Management Controller
Note For information about the platforms that have been tested on the E-Series Servers or NCE, see the "Software
Requirements" section in the Release Notes for Cisco UCS E-Series Servers and the Cisco UCS E-Series
Network Compute Engine.
Note The Cisco IMC management service is used only when the server is operating in Standalone Mode. If your
E-Series server is integrated into a UCS system, you must manage it using UCS Manager. For information
about using UCS Manager, see the configuration guides listed in the Cisco UCS E-Series Servers Documentation
Roadmap at
http://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/e/1-0/roadmap/e_series_road_map.html.
Management Interfaces
You can use a web-based GUI or SSH-based CLI or an XML-based API to access, configure, administer, and
monitor the server. Almost all tasks can be performed in either interface, and the results of tasks performed
in one interface are displayed in another. However, you cannot do the following:
• Use Cisco IMC GUI to invoke Cisco IMC CLI
• View a command that has been invoked through Cisco IMC CLI in Cisco IMC GUI
• Generate Cisco IMC CLI output from Cisco IMC GUI
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
3
Overview
Cisco Integrated Management Controller
• Configure communication services, including HTTP, SSH, IPMI Over LAN, and SNMP.
• Manage certificates
• Configure platform event filters
• Update Cisco IMC firmware
• Monitor faults, alarms, and server status
• Set time zone and view local time
• Install and activate Cisco IMC firmware
• Install and activate BIOS firmware
• Install and activate CMC firmware
You can use Cisco IMC to perform the following server management tasks:
• Manage remote presence
• Create and manage local user accounts, and enable remote user authentication through Active Directory
• Configure network-related settings, including NIC properties, IPv4, VLANs, and network security
• Configure communication services, including HTTP, SSH, IPMI Over LAN, and SNMP.
• Manage certificates
• Configure platform event filters
• Update Cisco IMC firmware
• Monitor faults, alarms, and server status
• Set time zone and view local time
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
4
Overview
Overview of the Cisco IMC User Interface
Note In case you lose or forget the password that you use to log in to Cisco IMC, see the password recovery
instructions in the Hardware Installation Guide for Cisco UCS E-Series Servers and the Cisco UCS E-Series
Network Compute Engine. This guide is available at
http://www.cisco.com/c/en/us/td/docs/unified_computing/ucs/e/1-0/roadmap/e_series_road_map.html.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
5
Overview
Navigation and Work Panes
The Navigation pane header displays action buttons that allow you to view the navigation map of the entire
GUI, view the index, or select a favorite work pane to go to, directly. The Pin icon prevents the Navigation
pane from sliding in once the Work pane displays.
The Favorite icon is a star shaped button which allows you to make any specific work pane in the application
as your favorite. To do this, navigate to the work pane of your choice and click the Favorite icon. To access
this work pane directly from anywhere else in the application, click the Favorite icon again.
The GUI header displays information about the overall status of the chassis and user login information.
The GUI header also displays the total number of faults (indicated in green or red), with a Bell icon next to
it. However, clicking this icon displays the summary of only the critical and major faults of various components.
To view all the faults, click the View All button to display the Fault Summary pane.
Chassis Menu
Each node in the Chassis menu leads to one or more tabs that display in the Work pane. These tabs provides
access to the following information:
Chassis Menu Node Name Work Pane Tabs Provide Information About...
Inventory Servers, power supplies, Cisco VIC adapters, and Dynamic Storage
management information.
Faults and Logs Fault summary, fault history, system event log, Cisco IMC logs,
and logging controls.
Compute Menu
The Compute menu contains information about the server, and the following information is displayed in the
Work pane.
Compute Menu Node Name Work Pane Tabs Provide Information About...
Inventory Installed CPUs, memory cards, PCI adapters, Cisco VIC adapters,
vNICs, storage information and trusted platform module (TPM).
BIOS The installed BIOS firmware version and the server boot order.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
6
Overview
Navigation and Work Panes
Compute Menu Node Name Work Pane Tabs Provide Information About...
Remote Management KVM, virtual media, and Serial over LAN settings.
Storage Menu
Each node in the Storage menu corresponds to the LSI MegaRAID controllers that are installed in the Cisco
UCS E-Series Rack-Mount Servers. Each node leads to one or more tabs that display in the Work pane and
provide information about the installed controllers.
Storage Menu Node Name Work Pane Tabs Provide Information About...
Controller Info General information about the selected LSI MegaRAID controller.
Physical Drive Info General drive information, identification information, and drive
statusl
Virtual Drive Info General drive information, RAID information, and physical drive
information.
Battery Backup Unit Backup battery information for the selected MegaRAID controller.
Admin Menu
Each node in the Admin menu leads to one or more tabs that display in the Work pane. These tabs provides
access to the following information:
Admin Menu Node Name Work Pane Tabs Provide Information About...
User Management Locally-defined user accounts, Active Directory settings, and
current user session information.
Networking NIC, IPv4, IPv6, VLAN, and LOM properties, along with network
security and NTP settings.
Communication Services HTTP, XML API, SSH, Redfish, IPMI over LAN, and SNMP
settings.
Firmware Management Cisco IMC and BIOS firmware information and management.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
7
Overview
Toolbar
Toolbar
The toolbar displays above the Work pane.
Host Power Displays the drop-down menu for you to choose power options.
Launch KVM Displays the drop-down menu to launch the Java based or HTML based
KVM console.
Procedure
Step 1 In your web browser, type or select the web link for Cisco IMC.
Step 2 If a security dialog box displays, do the following:
a) (Optional) Check the check box to accept all content from Cisco.
b) Click Yes to accept the certificate and continue.
Step 3 In the log in window, enter your username and password.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
8
Overview
Logging out of Cisco IMC
Tip When logging in for the first time to an unconfigured system, use admin as the username and
password as the password.
The following situations occur when you login to the Web UI for the first time:
• You cannot perform any operation until you change default admin credentials on the Cisco
IMC Web UI.
• You cannot close or cancel the password change pop-up window and opening it in a tab or
refreshing the browser page will continue to display the pop-up window. This pop-up window
appears when you login after a factory reset.
• You cannot choose the word 'password' as your new password. If this creates problems for any
scripts you may be running, you could change it to password by logging back into the user
management options, but this is ENTIRELY at your own risk. It is not recommended by Cisco.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
9
Overview
Logging out of Cisco IMC
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
10
CHAPTER 2
Installing the Server Operating System or
Hypervisor
This chapter includes the following sections:
• Operating System or Hypervisor Installation Methods, on page 11
• KVM Console, on page 11
• PXE Installation Servers, on page 12
• Host Image Mapping, on page 14
Caution You must use only one method to map virtual drives. For example, you must use either the KVM console or
the Host Image Mapping method. Using a combination of methods will cause the server to be in an undefined
state.
KVM Console
The KVM console is an interface accessible from the CIMC that emulates a direct keyboard, video, and mouse
connection to the server. The KVM console allows you to connect to the server from a remote location. Instead
of using CD/DVD or floppy drives physically connected to the server, the KVM console uses virtual media,
which are actual disk drives or disk image files that are mapped to virtual CD/DVD or floppy drives. You
can map any of the following to a virtual drive:
• CD/DVD or floppy drive on your computer
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
11
Installing the Server Operating System or Hypervisor
PXE Installation Servers
You can use the KVM console to install an operating system or hypervisor on the server and to do the following:
• Access the BIOS setup menu by pressing F2 during bootup.
• Access the CIMC Configuration Utility by pressing F8 during bootup.
Note The CIMC Configuration Utility is not applicable to the EHWIC E-Series NCE
and the NIM E-Series NCE.
• On Cisco UCS M1 and M2 servers, access the WebBIOS to configure RAID, by pressing Ctrl-H during
bootup.
On Cisco UCS M3 servers, access the MegaRAID controller to configure RAID, by pressing Ctrl-R
during bootup.
Note RAID is not supported on EHWIC E-Series NCE and NIM E-Series NCE. The
Ctrl-H and Ctrl-R will not work on these SKUs.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
12
Installing the Server Operating System or Hypervisor
Installing an Operating System or Hypervisor Using a PXE Installation Server
Note PXE installation is an efficient method for installing a platform on a large number of servers. However,
considering that this method requires setting up a PXE environment, it might be easier to use another installation
method.
Procedure
If a PXE install server is available on the VLAN, the installation process begins when the server reboots. PXE
installations are typically automated and require no additional user input. Refer to the installation guide for
the operating system or hypervisor being installed to guide you through the rest of the installation process.
What to do next
After the installation is complete, reset the LAN boot order to its original setting.
Step 2 Enter your VMware credentials, and then click Log In.
If you do not have an account with VMware, click Register to create a free account.
Step 3 Click Downloads, and then select All Products from the drop-down list.
Step 4 Do one of the following as appropriate:
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
13
Installing the Server Operating System or Hypervisor
Host Image Mapping
What to do next
Install the VMware vSpere Hypervisor image.
Note The VMware vSphere Hypervisor requires a customized image. To download the customized image, see
Downloading the Customized VMware vSphere Hypervisor Image, on page 13.
Note If you start an image update while an update is already in process, both updates will fail.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
14
Installing the Server Operating System or Hypervisor
Mapping the Host Image
Procedure
Name Description
Server Type drop-down list The type of remote server on which the image is located. This can be
one of the following:
• FTP
• FTPS
• HTTP
• HTTPS
Note Depending on the remote server that you select, the fields
that display change.
Server IP Address field The IP address of the remote FTP or HTTP server.
File Path field The path and filename of the remote FTP or HTTP server.
The path and filename can contain up to 80 characters.
• If you are installing a host image, that image must have .iso or .img
as the file extension.
• If you are installing a diagnostics image, that image must have
.diag as the file extension.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
15
Installing the Server Operating System or Hypervisor
Unmapping the Host Image
Step 5 From the Image Information area, select the image to map, and then click Map Selected Image.
The image is mapped and mounted on the virtual drive of a USB controller. The virtual drive can be one of
the following:
• HDD—Hard disk drive
• FDD—Floppy disk drive
• CD/DVD—Bootable CD-ROM or DVD drive
Step 6 Set the boot order to make the virtual drive in which the image is mounted as the first boot device.
Tip To determine in which virtual drive the image is mounted, see the Host Image Update Status area
in the Host Image Mapping page.
What to do next
• After the installation is complete, reset the virtual media boot order to its original setting.
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
16
Installing the Server Operating System or Hypervisor
Deleting the Host Image
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
17
Installing the Server Operating System or Hypervisor
Deleting the Host Image
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
18
CHAPTER 3
Managing Chassis
This chapter includes the following sections:
• Chassis Summary, on page 19
• Chassis Inventory, on page 22
• Viewing Chassis Sensors, on page 24
• Faults Summary, on page 27
• Fault History, on page 29
• Cisco IMC Log, on page 31
• System Event Log, on page 33
• Logging Controls, on page 35
Chassis Summary
Viewing Chassis Summary
By default when you log on to the Cisco UCS E-Series rack-mount server, the Summary pane of the Chassis
is displayed in the Web UI. You can also view the Chassis summary when in another tab or working area, by
completing the following steps:
Procedure
Name Description
Product Name field The model name of the chassis.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
19
Managing Chassis
Viewing Chassis Summary
Name Description
BIOS version The BIOS version name.
Asset Tag field A user-defined tag for the server. By default, the asset tag for a new
server displays Unknown.
Step 4 In the Cisco IMC Information area of the Chassis Summary pane, review the following information:
Name Description
Hostname field A user-defined hostname for the Cisco IMC. By default, the hostname
appears in EXXXX-YYYYYYYYYYY format, where XXXX is the
model number and YYYYYYYYYYY is the serial number of the server.
MAC Address field The MAC address assigned to the active network interface to the Cisco
IMC.
Current Time field The current date and time according to the Cisco IMC clock.
Note Cisco IMC gets the current date and time from the server
BIOS when the NTP is disabled. When NTP is enabled, Cisco
IMC gets the current time and date from the NTP server. To
change this information, reboot the server and press F2 when
prompted to access the BIOS configuration menu. Then
change the date or time using the options on the main BIOS
configuration tab.
Local Time field The local time of the region according to the chosen time zone.
Timezone field Allows you to select a time zone by clicking on the Select Timezone
option. In the Select Timezone pop-up screen, mouse over the map and
click on the location to select your time zone or choose your time zone
from the Timezone drop-down menu.
Step 5 In the Router Information area of the Chassis Summary pane, review the following information:
Name Description
Router Model field The router model name.
Step 6 In the Chassis Status area of the Chassis Summary pane, review the following information:
Name Description
Power State field The current power state.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
20
Managing Chassis
Creating a Server Asset Tag
Name Description
Overall Server Status field The overall status of the server. This can be one of the following:
• Memory Test In Progress—The server is performing a self-test
of the installed memory. This condition normally occurs during
the boot process.
• Good
• Moderate Fault
• Severe Fault
Overall DIMM Status field The overall status of the memory modules. This can be one of the
following:
• Good
• Fault
• Severe Fault
You can click the link in this field to view detailed status information.
Overall Storage Status field The overall status of all controllers. This can be one of the following:
• Good
• Moderate Fault
• Severe Fault
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
21
Managing Chassis
Chassis Inventory
Chassis Inventory
Viewing Power Supply Properties
Procedure
Name Description
Device ID column The identifier for the power supply unit.
Max Output column The maximum output from the power supply, in watts.
Product ID column The product identifier for the power supply assigned by the vendor.
Procedure
Name Description
Controller field PCIe slot in which the controller drive is located.
PCI Slot field The name of the PCIe slot in which the controller drive is located.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
22
Managing Chassis
Viewing Network Adapter Properties
Name Description
Serial Number field The serial number of the storage controller.
Firmware Package Build field The active firmware package version number.
Cache Memory Size field The size of the cache memory, in megabytes.
Procedure
Name Description
Slot ID column The slot in which the adapter is installed.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
23
Managing Chassis
Viewing Chassis Sensors
Name Description
Redundancy Status field The power supply redundancy status.
Name Description
Sensor Name column The name of the sensor
Sensor Status column The status of the sensor. This can be one of the following:
• Unknown
• Informational
• Normal
• Warning
• Critical
• Non-Recoverable
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
24
Managing Chassis
Viewing Temperature Sensors
Name Description
Sensor Name column The name of the sensor.
Sensor Status column The status of the sensor. This can be one of the following:
• Unknown
• Informational
• Normal
• Warning
• Critical
• Non-Recoverable
Name Description
Sensor Name column The name of the sensor
Sensor Status column The status of the sensor. This can be one of the following:
• Unknown
• Informational
• Normal
• Warning
• Critical
• Non-Recoverable
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
25
Managing Chassis
Viewing Voltage Sensors
Name Description
Critical Threshold Max column The maximum critical threshold.
Name Description
Sensor Name column The name of the sensor
Sensor Status column The status of the sensor. This can be one of the following:
• Unknown
• Informational
• Normal
• Warning
• Critical
• Non-Recoverable
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
26
Managing Chassis
Viewing Current Sensors
Name Description
Name column The name of the storage device.
Faults Summary
Viewing the Fault Summary
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
27
Managing Chassis
Viewing the Fault Summary
Name Description
Total Displays the total number of rows in the Fault Entries
table.
Column drop-down list Allows you to choose the columns you wish to be
displayed.
Show drop-down list Customize the way you want to view fault entries
using filters. These can be:
• Quick Filter - Default view.
• Advanced Filter - Filter options to display the
fault entries based on one or more criteria. Using
the matching rule, you can view entries matching
all the rules or any one combination of rules you
specified in the Filter fields.
Click Go to view the entries matching the filter
criteria that you set.
Click the Save icon to save the filter criteria that
you set. This becomes a user-defined filter which
you can use later.
Note The user-defined filter appears in the
Manage Preset Filters dialog box.
Name Description
Time The time when the fault occurred.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
28
Managing Chassis
Fault History
Name Description
Severity This can be one of the following:
• Cleared - A fault or condition was cleared.
• Critical
• Info
• Major
• Minor
• Warning
Probable Cause The unique identifier associated with the event that
caused the fault.
Fault History
Viewing Faults History
Procedure
Name Description
Total Displays the total number of rows in the Fault History
table.
Column drop-down list Allows you to choose the columns you wish to be
displayed.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
29
Managing Chassis
Viewing Faults History
Name Description
Show drop-down list Customize the way you want to view fault history
entries using filters. These can be:
• Quick Filter - Default view.
• Advanced Filter - Filter options to display the
entries based on one or more criteria. Using the
matching rule, you can view entries matching all
the rules or any one combination of rules you
specified in the Filter fields.
Click Go to view the entries matching the filter
criteria that you set.
Click the Save icon to save the filter criteria that
you set. This becomes a user-defined filter which
you can use later.
Note The user-defined filter appears in the
Manage Preset Filters dialog box.
Name Description
Time The time when the fault occurred.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
30
Managing Chassis
Cisco IMC Log
Name Description
Severity This can be one of the following:
• Emergency
• Alert
• Critical
• Error
• Warning
• Notice
• Informational
• Debug
Probable Cause The unique identifier associated with the event that
caused the fault.
What to do next
Name Description
Clear Log button Clears all log files.
Note This option is only available if your user
ID is assigned the admin or user user role.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
31
Managing Chassis
Viewing the Cisco IMC Log
Name Description
Total Displays the total number of rows in the Cisco IMC
Log table.
Column drop-down list Allows you to choose the columns you wish to be
displayed.
Show drop-down list Customize the way you want to view Cisco IMC log
entries using filters. These can be:
• Quick Filter - Default view.
• Advanced Filter - Filter options to display the
log entries based on one or more criteria. Using
the matching rule, you can view entries matching
all the rules or any one combination of rules you
specified in the Filter fields.
Click Go to view the entries matching the filter
criteria that you set.
Click the Save icon to save the filter criteria that
you set. This becomes a user-defined filter which
you can use later.
Note The user-defined filter appears in the
Manage Preset Filters dialog box.
Name Description
Time column The date and time the event occurred.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
32
Managing Chassis
System Event Log
Name Description
Severity column The event severity. This can be one of the following:
• Emergency
• Alert
• Critical
• Error
• Warning
• Notice
• Informational
• Debug
Name Description
Clear Log button Clears all events from the log file.
Note This option is only available if your user
ID is assigned the admin or user user role.
Column drop-down list Allows you to choose the columns you wish to be
displayed.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
33
Managing Chassis
Viewing System Event Logs
Name Description
Show drop-down list Customize the way you want to view events using
filters. These can be:
• Quick Filter - Default view.
• Advanced Filter - Filter options to display the
events based on one or more criteria. Using the
matching rule, you can view entries matching all
the rules or any one combination of rules you
specified in the Filter fields.
Click Go to view the entries matching the filter
criteria that you set.
Click the Save icon to save the filter criteria that
you set. This becomes a user-defined filter which
you can use later.
Note The user-defined filter appears in the
Manage Preset Filters dialog box.
Name Description
Time column The date and time the event occurred.
Severity column The severity field includes both text and a color-coded icon. For the
icon, green indicates normal operation, yellow is informational, and
warning, critical, and non-recoverable errors are shown in shades of red.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
34
Managing Chassis
Logging Controls
Logging Controls
Viewing Logging Controls
Procedure
Name Description
Enabled check box If checked, the Cisco IMC sends log messages to the Syslog server
named in the IP Address field.
Host Name/IP Address field The address of the Syslog server on which the Cisco IMC log should
be stored. You can set an IPv4 or IPv6 address or a domain name as the
remote system address.
Port field Enter a destination port number of the Syslog server within the range 1
to 65535. The default port number is 514.
Minimum Severity to Report field Specify the lowest level of messages that will be included in the remote
logs. You can select one of the following:
• Emergency
• Alert
• Critical
• Error
• Warning
• Notice
• Informational
• Debug
Note The Cisco IMC does not remotely log any messages with a severity below the selected severity.
For example, if you select Error, then the Cisco IMC remote log contains all messages with the
severity Emergency, Alert, Critical, or Error. It does not show Warning, Notice, Informational,
or Debug messages.
Local Logging
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
35
Managing Chassis
Sending the Cisco IMC Log to a Remote Server
This area displays only the Minimum Severity to Report drop-down list as shown in the table above. You
can specify the lowest level of messages to be included in the local log
What to do next
Procedure
Name Description
Enabled check box If checked, the Cisco IMC sends log messages to the Syslog server
named in the IP Address field.
Host Name/IP Address field The address of the Syslog server on which the Cisco IMC log should
be stored. You can set an IPv4 or IPv6 address or a domain name as the
remote system address.
Port field Enter a destination port number of the Syslog server within the range 1
to 65535. The default port number is 514.
Step 4 (Optional) In the Minimum Severity to Report drop-down list, specify the lowest level of messages that
will be included in the remote logs.
You can select one of the following, in decreasing order of severity:
• Emergency
• Alert
• Critical
• Error
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
36
Managing Chassis
Configuring the Cisco IMC Log Threshold
• Warning
• Notice
• Informational
• Debug
Note Cisco IMC does not remotely log any messages with a severity below the selected severity. For
example, if you select Error, then the Cisco IMC remote log will contain all messages with the
severity Emergency, Alert, Critical, or Error. It will not show Warning, Notice, Informational, or
Debug messages.
Procedure
Note Cisco IMC does not log any messages with a severity below the selected severity. For example, if
you select Error, then the Cisco IMC log will contain all messages with the severity Emergency,
Alert, Critical, or Error. It will not show Warning, Notice, Informational, or Debug messages.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
37
Managing Chassis
Sending a Test Cisco IMC Log to a Remote Server
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
38
CHAPTER 4
Managing the Server
This chapter includes the following sections:
• Configuring BIOS Settings, on page 39
• Managing the Server Boot Order, on page 43
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
39
Managing the Server
Configuring Advanced BIOS Settings
If you want to apply your changes at a later time, clear the Reboot Host Immediately check box. Cisco IMC
stores the changes and applies them the next time the server reboots.
Note If there are existing BIOS parameter changes pending, Cisco IMC automatically overwrites the
stored values with the current settings when you click Save Changes.
Name Description
Save button Saves the settings for the BIOS parameters and closes the dialog box.
If the Reboot Host Immediately check box is checked, the server is
rebooted immediately and the new BIOS settings go into effect.
Otherwise the changes are saved until the server is manually rebooted.
Reset button Resets the values for the BIOS parameters on all three tabs to the settings
that were in effect when this dialog box was first opened.
Restore Defaults button Sets the BIOS parameters on all three tabs to their default settings.
Note Depending on your installed hardware, some configuration options described in this topic may not appear.
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
40
Managing the Server
Configuring Server Management BIOS Settings
Name Description
Save button Saves the settings for the BIOS parameters on all three tabs and closes
the dialog box.
Reset button Restores the values for the BIOS parameters on all three tabs to the
settings that were in effect when this dialog box was first opened.
Restore Defaults button Sets the BIOS parameters on all three tabs to their default settings.
Name Description
Save button Saves the settings for the BIOS parameters on all three tabs and closes
the dialog box.
Reset button Restores the values for the BIOS parameters on all three tabs to the
settings that were in effect when this dialog box was first opened.
Restore Defaults button Sets the BIOS parameters on all three tabs to their default settings.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
41
Managing the Server
Entering BIOS Setup
Procedure
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
42
Managing the Server
Managing the Server Boot Order
Procedure
Note The actual boot order differs from the configured boot order if either of the following conditions occur:
• BIOS encounters issues while trying to boot using the configured boot order.
• A user changes the boot order directly through BIOS.
• BIOS appends devices that are seen by the host but are not configured from the user.
Note When you create a new policy using the configure boot order feature, BIOS tries to map this new policy to
the devices in the system. It displays the actual device name and the policy name to which it is mapped in the
Actual Boot Order area. If BIOS cannot map any device to a particular policy in Cisco IMC, the actual device
name is stated as NonPolicyTarget in the Actual Boot Order area.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
43
Managing the Server
Managing a Boot Device
Procedure
Step 4 In the Configure Boot Order dialog box, clcik Basic tab and from the Device Types table, choose the device
that you want add to the boot order.
To add the local HDD device, click Advanced tab, click Add Local HDD, and update the following parameters:
Name Description
Name field The name of the device.
Note Once created, you cannot rename the device.
State drop-down list The visibility of the device by BIOS. This can be one of the following:
• Enabled—The device is visible to BIOS in a boot order
configuration.
• Disabled—The device is not visible to BIOS in a boot
configuration.
Order field The order of the device in the available list of devices.
Enter between 1 and n, where n is the number of devices.
Slot field The slot in which the device is installed. Enter the slot number from the
available range.
Save Changes button Adds the device to the Boot Order table.
Cancel button Closes the dialog box without saving any changes made while the dialog
box was open.
To add the PXE device, click Add PXE, and update the following parameters:
Name Description
Name field The name of the device.
This name cannot be changed after the device has been created.
State drop-down list The visibility of the device by BIOS. The state can be one of the
following:
• Enabled—The device is visible to BIOS in a boot order
configuration.
• Disabled—The device is not visible to BIOS in a boot order
configuration.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
44
Managing the Server
Managing a Boot Device
Name Description
Order field The order of the device in the available list of devices.
Enter between 1 and n, where n is the number of devices.
Slot field
Port field The port of the slot in which the device is present.
Enter a number between 0 and 255.
Save Changes button Adds the device to the Boot Order table.
Cancel button Closes the dialog box without saving any changes made while the dialog
box was open.
To add the SAN boot device, click Add SAN, and update the following parameters:
Name Description
Name field The name of the device.
This name cannot be changed after the device has been created.
State drop-down list The visibility of the device by BIOS. The state can be one of the
following:
• Enabled—The device is visible to BIOS in a boot order
configuration.
• Disabled—The device is not visible to BIOS in a boot order
configuration.
Order field The order of the device in the available list of devices.
Enter between 1 and n, where n is the number of devices.
Slot field The slot in which the device is installed. Enter the slot number from the
available range.
Save Changes button Adds the device to the Boot Order table.
Cancel button Closes the dialog box without saving any changes made while the dialog
box was open.
To add the iSCSI boot device, click Add iSCSI, and update the following parameters:
Name Description
Name field The name of the device.
This name cannot be changed after the device has been created.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
45
Managing the Server
Managing a Boot Device
Name Description
State drop-down list The visibility of the device by BIOS. The state can be one of the
following:
• Enabled—The device is visible to BIOS in a boot order
configuration.
• Disabled—The device is not visible to BIOS in a boot order
configuration.
Order field The order of the device in the available list of devices.
Enter between 1 and n, where n is the number of devices.
Slot field The slot in which the device is installed. Enter the slot number from the
available range.
Port field The port of the slot in which the device is present.
Enter a number between 0 and 255.
Note In case of a VIC card, use a vNIC instance instead of the port
number.
Save Changes button Adds the device to the Boot Order table.
Cancel button Closes the dialog box without saving any changes made while the dialog
box was open.
To add the SD card, click Add SD Card, and update the following parameters:
Name Description
Name field The name of the device.
This name cannot be changed after the device has been created.
State drop-down list The visibility of the device by BIOS. This can be one of the following:
• Enabled—The device is visible to BIOS in a boot order
configuration.
• Disabled—The device is not visible to BIOS in a boot
configuration.
Order field The order of the device in the available list of devices.
Enter between 1 and n, where n is the number of devices.
Save Changes button Adds the device to the Boot Order table.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
46
Managing the Server
Managing a Boot Device
Name Description
Cancel button Closes the dialog box without saving any changes made while the dialog
box was open.
To add the USB device, click Add USB, and update the following parameters:
Name Description
Name field The name of the device.
This name cannot be changed after the device has been created.
Sub Type drop-down list The subdevice type under a certain device type. This can be one of the
following:
• CD
• FDD
• HDD
State drop-down list The visibility of the device by BIOS. This can be one of the following:
• Enabled—The device is visible to BIOS in a boot order
configuration.
• Disabled—The device is not visible to BIOS in a boot order
configuration.
Order field The order of the device in the available list of devices.
Enter between 1 and n, where n is the number of devices.
Save Changes button Adds the device to the Boot Order table.
Cancel button Closes the dialog box without saving any changes made while the dialog
box was open.
To add the virtual media, click Virtual Media, and update the following parameters:
Name Description
Name field The name of the device.
This name cannot be changed after the device has been created.
Sub Type drop-down list The subdevice type under a certain device type. This could be any one
of the following:
• KVM Mapped DVD
• Cisco IMC Mapped DVD
• KVM Mapped HDD
• Cisco IMC Mapped HDD
• KVM Mapped FDD
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
47
Managing the Server
Managing a Boot Device
Name Description
State drop-down list The visibility of the device by BIOS. The state can be one of the
following:
• Enabled—The device is visible to BIOS in a boot order
configuration.
• Disabled—The device is not visible to BIOS in a boot order
configuration.
Order field The order of the device in the available list of devices.
Enter between 1 and n, where n is the number of devices.
Save Changes button Adds the device to the Boot Order table.
Cancel button Closes the dialog box without saving any changes made while the dialog
box was open.
To add the PCH storage device, click PCH Storage, and update the following parameters:
Name Description
Name field The name of the device.
This name cannot be changed after the device has been created.
State drop-down list The visibility of the device by BIOS. This can be one of the following:
• Enabled—The device is visible to BIOS in a boot order
configuration.
• Disabled—The device is not visible to BIOS in a boot order
configuration.
Order field The order of the device in the available list of devices.
Enter between 1 and n, where n is the number of devices.
Save Changes button Adds the device to the Boot Order table.
Cancel button Closes the dialog box without saving any changes made while the dialog
box was open.
To add the UEFI shell device, click Add UEFI Shell, and update the following parameters:
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
48
Managing the Server
Enabling UEFI Secure Boot
Name Description
Name field The name of the device.
This name cannot be changed after the device has been created.
State drop-down list The visibility of the device by BIOS. The state can be one of the
following:
• Enabled—The device is visible to BIOS in a boot order
configuration.
• Disabled—The device is not visible to BIOS in a boot order
configuration.
Order field The order of the device in the available list of devices.
Enter between 1 and n, where n is the number of devices.
Save Changes button Adds the device to the Boot Order table.
Cancel button Closes the dialog box without saving any changes made while the dialog
box was open.
If you enable UEFI secure boot on a nonsupported OS, on the next reboot, you cannot boot from that particular
OS. If you try to boot from the previous OS, an error is reported and recorded under the system software event
in the web UI. You must disable the UEFI secure boot option by using Cisco IMC to boot from your previous
OS.
What to do next
Reboot the server to have your configuration boot mode settings take place.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
49
Managing the Server
Disabling UEFI Secure Boot
What to do next
Reboot the server to have your configuration boot mode settings take place.
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
50
Managing the Server
Configuring the Power Restore Policy for Modules on ISRG2
Note When you create a new policy using the configured boot order, BIOS tries to map this new policy
to the device or devices present in the system. It displays the actual device name and the policy
name to which it is mapped under the Actual Boot Order area. If BIOS cannot map any device
found to a particular policy in Cisco IMC, then the actual device name is stated as NonPolicyTarget
under the Actual Boot Order area.
Note Even though you can see the changed settings in the GUI, you have to reboot the sever for the settings to take
effect.
Procedure
Name Description
Power Restore Policy The action to be taken when chassis power is restored
after an unexpected power loss. This can be one of
the following:
Power On – The server is powered on post the power
outage.
Power Off – The server remains in the power off
state.
Restore Last State – The server is set to the state it
was in prior to the power outage.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
51
Managing the Server
Configuring the Power Restore Policy for Modules on ISR4K
Procedure
Name Description
Power Restore Policy The action to be taken when chassis power is restored
after an unexpected power loss. This can be one of
the following:
Power On – The server is powered on post the power
outage.
Power Off – The server remains in the power off
state.
Restore Last State – The server is set to the state it
was in prior to the power outage.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
52
CHAPTER 5
Viewing Sensors
This chapter includes the following sections:
• Viewing Chassis Sensors, on page 53
Name Description
Redundancy Status field The power supply redundancy status.
Name Description
Sensor Name column The name of the sensor
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
53
Viewing Sensors
Viewing Power Supply Sensors
Name Description
Sensor Status column The status of the sensor. This can be one of the following:
• Unknown
• Informational
• Normal
• Warning
• Critical
• Non-Recoverable
Name Description
Sensor Name column The name of the sensor.
Sensor Status column The status of the sensor. This can be one of the following:
• Unknown
• Informational
• Normal
• Warning
• Critical
• Non-Recoverable
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
54
Viewing Sensors
Viewing Fan Sensors
Name Description
Sensor Name column The name of the sensor
Sensor Status column The status of the sensor. This can be one of the following:
• Unknown
• Informational
• Normal
• Warning
• Critical
• Non-Recoverable
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
55
Viewing Sensors
Viewing Voltage Sensors
Name Description
Sensor Name column The name of the sensor
Sensor Status column The status of the sensor. This can be one of the following:
• Unknown
• Informational
• Normal
• Warning
• Critical
• Non-Recoverable
Name Description
Sensor Name column The name of the sensor
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
56
Viewing Sensors
Viewing Current Sensors
Name Description
Sensor Status column The status of the sensor. This can be one of the following:
• Unknown
• Informational
• Normal
• Warning
• Critical
• Non-Recoverable
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
57
Viewing Sensors
Viewing Storage Sensors
Name Description
Name column The name of the storage device.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
58
CHAPTER 6
Managing Remote Presence
This chapter includes the following sections:
• Configuring Serial Over LAN, on page 59
• Configuring Virtual Media, on page 61
• KVM Console, on page 67
• Launching KVM Console, on page 67
• Virtual KVM Console (HTML Based), on page 67
• Comparison Between Java Based KVM and HTML5 Based KVM, on page 70
• Configuring the Virtual KVM, on page 72
• Host Image Mapping, on page 73
Procedure
Name Description
Enabled check box If checked, Serial over LAN (SoL) is enabled on the server.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
59
Managing Remote Presence
Configuring Serial Over LAN
Name Description
Baud Rate drop-down list The baud rate the system uses for SoL communication. This can be one
of the following:
• 9600 bps
• 19.2 kbps
• 38.4 kbps
• 57.6 kbps
• 115.2 kbps
Com Port drop-down list The serial port through which the system routes SoL communication.
Note This field is available only on some E-Series servers. If it is
not available, the server always uses COM port 0 for SoL
communication.
Note Changing the Com Port setting disconnects any existing SoL
sessions.
SSH Port filed The port through which you can access Serial over LAN directly. The
port enables you to by-pass the Cisco IMC shell to provide direct access
to SoL.
The valid range is 1024 to 65535. The default value is 2400.
Note Changing the SSH Port setting disconnects any existing SSH
sessions.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
60
Managing Remote Presence
Configuring Virtual Media
Procedure
Name Description
Enabled check box If checked, virtual media is enabled.
Note If you clear this check box, all virtual media devices are
automatically detached from the host.
Active Sessions field The number of virtual media sessions that are currently running.
Enable Virtual Media Encryption If checked, all virtual media communications are encrypted.
check box
Procedure
Name Description
Volume field The identity of the image mounted for mapping.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
61
Managing Remote Presence
Creating a Cisco IMC Mapped vMedia Volume
Name Description
Mount Type drop-down list The type of mapping. This can be one of the following:
Note Ensure that the communication port of the mount type that
you choose is enabled on the switch. For example, when you
are using CIFS as your mount type, ensure port 445 (which
is its communication port) is enabled on the switch. Similarly,
enable ports 80 for HTTP, 443 for HTTPS and 2049 for NFS
when you use them.
Remote Share field The URL of the image to be mapped. The format depends on the selected
Mount Type:
• NFS—Use serverip:/share.
• CIFS—Use //serverip/share.
• WWW(HTTP/HTTPS)—Use
http[s]://serverip/share.
Remote File field The name and location of the .iso or .img file in the remote share.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
62
Managing Remote Presence
Creating a Cisco IMC Mapped vMedia Volume
Name Description
Mount Options field
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
63
Managing Remote Presence
Creating a Cisco IMC Mapped vMedia Volume
Name Description
Industry-standard mount options entered in a comma separated list. The
options vary depending on the selected Mount Type.
If you are using NFS, leave the field blank or enter one or more of the
following:
• ro
• rw
• nolock
• noexec
• soft
• port=VALUE
• timeo=VALUE
• retry=VALUE
If you are using CIFS, leave the field blank or enter one or more of the
following:
• soft
• nounix
• noserverino
• guest
• username=VALUE—ignored if guest is entered.
• password=VALUE—ignored if guest is entered.
• sec=VALUE
The protocol to use for authentication when communicating with
the remote server. Based on the configuration of CIFS share, the
VALUES can be one of the following:
• None—No authentication is used
• Ntlm—NT LAN Manager (NTLM) security protocol. Use
this option only with Windows 2008 R2 and Windows 2012
R2.
• Ntlmi—NTLMi security protocol. Use this option only when
you enable Digital Signing on the CIFS Windows server.
• Ntlmssp—NT LAN Manager Security Support Provider
(NTLMSSP) protocol. Use this option only with Windows
2008 R2 and Windows 2012 R2.
• Ntlmsspi—NTLMSSPi protocol. Use this option only when
you enable Digital Signing on the CIFS Windows server.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
64
Managing Remote Presence
Viewing Cisco IMC-Mapped vMedia Volume Properties
Name Description
• Ntlmv2—NTLMv2 security protocol. Use this option only
with Samba Linux.
• Ntlmv2i—NTLMv2i security protocol. Use this option only
with Samba Linux.
• username=VALUE
• password=VALUE
User Name field The username for the specified Mount Type, if required.
Procedure
Name Description
Add New Mapping button Opens a dialog box that allows you to add a new image.
Properties button Opens a dialog box that allows you to view or change the properties for
the selected image.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
65
Managing Remote Presence
Removing a Cisco IMC-Mapped vMedia Volume
Name Description
Unmap button Unmaps the mounted vMedia.
Status field The current status of the map. This can be one of the following:
• OK—The mapping is successful.
• In Progress—The mapping is in progress.
• Stale—Cisco IMC displays a text string with the reason why the
mapping is stale.
• Error—Cisco IMC displays a text string with the reason for the
error.
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
66
Managing Remote Presence
KVM Console
KVM Console
The KVM console is an interface accessible from Cisco IMC that emulates a direct keyboard, video, and
mouse (KVM) connection to the server. The KVM console allows you to connect to the server from a remote
location.
Instead of using CD/DVD or floppy drives physically connected to the server, the KVM console uses virtual
media, which are actual disk drives or disk image files that are mapped to virtual CD/DVD or floppy drives.
You can map any of the following to a virtual drive:
• CD/DVD or floppy drive on your computer
• Disk image files (ISO or IMG files) on your computer
• USB flash drive on your computer
• CD/DVD or floppy drive on the network
• Disk image files (ISO or IMG files) on the network
• USB flash drive on the network
Procedure
Step 1 To launch the console from Home page, in the Navigation pane, click the Chassis menu.
Step 2 In the Chassis menu, click Summary.
Step 3 From the tool bar, click Launch KVM and select Java based KVM or HTML based KVM.
Step 4 Alternatively, in the Navigation pane, click the Compute menu.
Step 5 In the Compute menu, select a server.
Step 6 In the work pane, click the Remote Management tab.
Step 7 In the Remote Management pane, click the Virtual KVM tab.
Step 8 In the Virtual KVM tab, click Launch Java based KVM console or Launch HTML based KVM console.
Step 9 Required: Click the URL link displayed in the pop-up window (HTML based KVM console only) to load the
client application. You need to click the link every time you launch the KVM console.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
67
Managing Remote Presence
Virtual KVM Console (HTML Based)
location and to map physical locations to virtual drives that can by accessed by the server during this KVM
session.
File Menu
View Menu
Refresh Updates the console display with the server's current video output.
Full Screen Expands the KVM console so that it fills the entire screen.
Macros Menu
Choose the keyboard shortcut you want to execute on the remote system.
User Defined Macros menu Displays the user-defined macros that have been created.
Manage button Opens the Configure User Defined Macros dialog box, which allows
you to create and manage macros.
System-defined macros cannot be deleted.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
68
Managing Remote Presence
Virtual KVM Console (HTML Based)
Tools Menu
Session User List Opens the Session User List dialog box that shows all the user IDs that
have an active KVM session.
Power Menu
Power Off System button Powers off the system from the virtual console
session.
This option is enabled when the system is powered
on and disabled when the system is not powered on.
Reset System (warm boot)button Reboots the system without powering it off.
This option is enabled when the system is powered
on and disabled when the system is not powered on.
Power Cycle System (cold boot) button Turns off system and then back on.
This option is enabled when the system is powered
on and disabled when the system is not powered on.
Name Description
Activate Virtual Devices Activates a vMedia session that allows you to attach
a drive or image file from your local computer or
network.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
69
Managing Remote Presence
Comparison Between Java Based KVM and HTML5 Based KVM
Name Description
Map CD/DVD You can map a CD or a DVD image from your local
machine and map the drive to the image.
Note This option is available when you click
Activate Virtual Devices.
Map Removable Disk You can map a removable disk image from your local
machine and map the drive to the image.
Note This option is available when you click
Activate Virtual Devices.
Map Floppy Disk You can map a floppy disk image from your local
machine and map the drive to the image.
Note This option is available when you click
Activate Virtual Devices.
Help Menu
Name Description
Help Topics Clicking this option brings you back to this window.
About KVM Viewer Displays the version number of the KVM viewer.
Settings
The Settings icon is located on the top right hand corner of the HTML KVM viewer window.
Name Description
Logged in as: Displays your user role ID.
Menu Option Action Available in Java Based Available in HTML5 Based KVM
KVM
File Open Yes NA
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
70
Managing Remote Presence
Comparison Between Java Based KVM and HTML5 Based KVM
Menu Option Action Available in Java Based Available in HTML5 Based KVM
KVM
Paste Text from File Yes No
Fit Yes No
Video-Scaling Yes No
Mini-Mod Yes No
Keyboard NA Yes
Stats Yes No
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
71
Managing Remote Presence
Configuring the Virtual KVM
Procedure
Name Description
Enabled check box If checked, the virtual KVM is enabled.
Note The virtual media viewer is accessed through the KVM. If
you disable the KVM console, Cisco IMC also disables access
to all virtual media devices attached to the host.
Max Sessions drop-down list The maximum number of concurrent KVM sessions allowed. You can
select any number between 1 and 4.
Active Sessions field The number of KVM sessions running on the server.
Enable Video Encryption check If checked, the server encrypts all video information sent through the
box KVM.
Enable Local Server Video check If checked, the KVM session is also displayed on any monitor attached
box to the server.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
72
Managing Remote Presence
Disabling the Virtual KVM
Procedure
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
73
Managing Remote Presence
Mapping the Host Image
• Obtain the host image file from the appropriate third party.
Note The VMware vSphere Hypervisor requires a customized image. To download the customized image, see
Downloading the Customized VMware vSphere Hypervisor Image, on page 13.
Note If you start an image update while an update is already in process, both updates will fail.
Procedure
Name Description
Server Type drop-down list The type of remote server on which the image is located. This can be
one of the following:
• FTP
• FTPS
• HTTP
• HTTPS
Note Depending on the remote server that you select, the fields
that display change.
Server IP Address field The IP address of the remote FTP or HTTP server.
File Path field The path and filename of the remote FTP or HTTP server.
The path and filename can contain up to 80 characters.
• If you are installing a host image, that image must have .iso or .img
as the file extension.
• If you are installing a diagnostics image, that image must have
.diag as the file extension.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
74
Managing Remote Presence
Unmapping the Host Image
Name Description
Password field The password for the username.
The password can contain 1 to 20 characters.
Note If the username is not configured, enter anonymous for the
username and any character(s) for the password.
Step 5 From the Image Information area, select the image to map, and then click Map Selected Image.
The image is mapped and mounted on the virtual drive of a USB controller. The virtual drive can be one of
the following:
• HDD—Hard disk drive
• FDD—Floppy disk drive
• CD/DVD—Bootable CD-ROM or DVD drive
Step 6 Set the boot order to make the virtual drive in which the image is mounted as the first boot device.
Tip To determine in which virtual drive the image is mounted, see the Host Image Update Status area
in the Host Image Mapping page.
What to do next
• After the installation is complete, reset the virtual media boot order to its original setting.
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
75
Managing Remote Presence
Deleting the Host Image
Step 2 In the work pane, click the Host Image Mapping tab.
Step 3 In the work pane, click the Host Image Mapping tab.
Step 4 Click Unmap Image.
The mapped image is unmounted from the virtual drive of the USB controller.
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
76
CHAPTER 7
Managing User Accounts
This chapter includes the following sections:
• Configuring Local Users, on page 77
• Password Expiry, on page 79
• LDAP Servers, on page 79
• Viewing User Sessions, on page 92
Procedure
Name Description
ID field The unique identifier for the user.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
77
Managing User Accounts
Configuring Local Users
Name Description
Role Played field The role assigned to the user. This can be one of the following:
• read-only—A user with this role can view information but cannot
make any changes.
• user—A user with this role can perform the following tasks:
• View all information
• Manage the power control options such as power on, power
cycle, and power off
• Launch the KVM console and virtual media
• Clear all logs
• Toggle the locator LED
• Set time zone
• Ping
• admin—A user with this role can perform all actions available
through the GUI, CLI, and IPMI.
Enabled check box If checked, the user is enabled on the Cisco IMC.
Change Password check box If checked, when you save the changes the password for this user will
be changed. You must check this box if this is a new user name.
New Password field The password for this user name. When you move the mouse over the
help icon beside the field, the following guidelines to set the password
are displayed:
• The password must have a minimum of 8 and a maximum of 20
characters.
• The password must not contain the User's Name.
• The password must contain characters from three of the following
four categories:
• English uppercase characters (A through Z).
• English lowercase characters (a through z).
• Base 10 digits (0 through 9).
• Non-alphabetic characters (!, @, #, $, %, ^, &, *, -, _, , =, '').
These rules are meant to define a strong password for the user, for
security reasons. However, if you want to set a password of your choice
ignoring these guidelines, click the Disable Strong Password button
on the Local Users tab. While setting a password when the strong
password option is disabled, you can use between 1- 20 characters.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
78
Managing User Accounts
Password Expiry
Name Description
Confirm New Password field The password repeated for confirmation purposes.
Password Expiry
You can set a shelf life for a password, after which it expires. As an administrator, you can set this time in
days. This configuration would be common to all users. Upon password expiry, the user is notified on login
and would not be allowed to login unless the password is reset.
Note When you downgrade to an older database, existing users are deleted. The database returns to default settings.
Previously configured users are cleared and the database is empty, that is, the database has the default username
- 'admin' and password - 'password'. Since the server is left with the default user database, the change default
credential feature is enabled. This means that when the 'admin' user logs on to the database for the first time
after a downgrade, the user must mandatorily change the default credential.
LDAP Servers
Cisco IMC supports directory services that organize information in a directory, and manage access to this
information. Cisco IMC supports Lightweight Directory Access Protocol (LDAP), which stores and maintains
directory information in a network. In addition, Cisco IMC supports Microsoft Active Directory (AD). Active
Directory is a technology that provides a variety of network services including LDAP-like directory services,
Kerberos-based authentication, and DNS-based naming. The Cisco IMC utilizes the Kerberos-based
authentication service of LDAP.
When LDAP is enabled in the Cisco IMC, user authentication and role authorization is performed by the
LDAP server for user accounts not found in the local user database. The LDAP user authentication format is
username@domain.com.
you can require the server to encrypt data sent to the LDAP server.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
79
Managing User Accounts
Configuring the LDAP Server
LDAP schema to add a new custom attribute, such as the CiscoAVPair attribute, which has an attribute ID
of 1.3.6.1.4.1.9.287247.1.
Important For more information about altering the schema, see the article at
http://technet.microsoft.com/en-us/library/bb727064.aspx.
Note This example creates a custom attribute named CiscoAVPair, but you can also use an existing LDAP attribute
that is mapped to the Cisco IMC user roles and locales.
Procedure
Properties Value
Description CiscoAVPair
Step 3 Add the CiscoAVPair attribute to the user class using the snap-in:
a) Expand the Classes node in the left pane and type U to select the user class.
b) Click the Attributes tab and click Add.
c) Type C to select the CiscoAVPair attribute.
d) Click OK.
Step 4 Add the following user role values to the CiscoAVPair attribute, for the users that you want to have access
to Cisco IMC:
admin shell:roles="admin"
user shell:roles="user"
read-only shell:roles="read-only"
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
80
Managing User Accounts
Configuring LDAP Settings and Group Authorization in Cisco IMC
Note For more information about adding values to attributes, see the article at
http://technet.microsoft.com/en-us/library/bb727064.aspx.
What to do next
Use the Cisco IMC to configure the LDAP server.
Procedure
Name Description
Enable LDAP check box If checked, user authentication and role authorization
is performed first by the LDAP server, followed by
user accounts that are not found in the local user
database.
Domain field The IPv4 domain that all users must be in.
This field is required unless you specify at least one
Global Catalog server address.
Enable Encryption check box If checked, the server encrypts all information it sends
to the LDAP server.
Enable Binding CA Certificate check box If checked, allows you to bind the LDAP CA
certificate.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
81
Managing User Accounts
Configuring LDAP Settings and Group Authorization in Cisco IMC
Name Description
Timeout (0 - 180) seconds The number of seconds the Cisco IMC waits until the
LDAP search operation times out.
If the search operation times out, Cisco IMC tries to
connect to the next server listed on this tab, if one is
available.
Note The value you specify for this field could
impact the overall time.
User Search Precedence Allows you to specify the order of search between the
local user database and LDAP user database. This can
be one of the following:
• Local User Database (Default setting)
• LDAP User Database
Note If you checked the Enable Encryption and the Enable Binding CA Certificate check boxes, enter
the fully qualified domain name (FQDN) of the LDAP server in the LDAP Server field. To resolve
the FQDN of the LDAP server, configure the preferred DNS of Cisco IMC network with the
appropriate DNS IP address.
Step 5 In the Configure LDAP Servers area, update the following properties:
Name Description
Pre-Configure LDAP Servers radio button If checked, the Active Directory uses the
pre-configured LDAP servers.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
82
Managing User Accounts
Configuring LDAP Settings and Group Authorization in Cisco IMC
Name Description
Port The port numbers for the servers.
If you are using Active Directory for LDAP, then for
servers 1, 2 and 3, which are domain controllers, the
default port number is 389. For servers 4, 5 and 6,
which are Global Catalogs, the default port number
is 3268.
LDAPS communication occurs over the TCP 636 port.
LDAPS communication to a global catalog server
occurs over TCP 3269 port.
Use DNS to Configure LDAP Servers radio button If checked, you can use DNS to configure access to
the LDAP servers.
Source Specifies how to obtain the domain name used for the
DNS SRV request. It can be one of the following:
• Extracted—specifies using domain name
extracted-domain from the login ID
• Configured—specifies using the
configured-search domain.
• Configured-Extracted—specifies using the
domain name extracted from the login ID than
the configured-search domain.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
83
Managing User Accounts
Configuring LDAP Settings and Group Authorization in Cisco IMC
Name Description
Method It can be one of the following:
• Anonymous—requires NULL username and
password. If this option is selected and the LDAP
server is configured for Anonymous logins, then
the user can gain access.
• Configured Credentials—requires a known set
of credentials to be specified for the initial bind
process. If the initial bind process succeeds, then
the distinguished name (DN) of the user name
is queried and re-used for the re-binding process.
If the re-binding process fails, then the user is
denied access.
• Login Credentials—requires the user
credentials. If the bind process fails, the user is
denied access.
By default, the Login Credentials option is
selected.
Name Description
Filter Attribute This field must match the configured attribute in the
schema on the LDAP server.
By default, this field displays sAMAccountName.
Group Attribute This field must match the configured attribute in the
schema on the LDAP server.
By default, this field displays memberOf.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
84
Managing User Accounts
Configuring LDAP Settings and Group Authorization in Cisco IMC
Name Description
Attribute An LDAP attribute that contains the role and locale
information for the user. This property is always a
name-value pair. The system queries the user record
for the value that matches this attribute name.
The LDAP attribute can use an existing LDAP
attribute that is mapped to the Cisco IMC user roles
and locales, or can modify the schema such that a new
LDAP attribute can be created. For example,
CiscoAvPair.
Note If you do not specify this property, the user
cannot login. Although the object is located
on the LDAP server, it should be an exact
match of the attribute that is specified in
this field.
Nested Group Search Depth (1-128) Parameter to search for an LDAP group nested within
another defined group in an LDAP group map. The
parameter defines the depth of a nested group search.
Step 8 (Optional) In the Group Authorization area, update the following properties:
Name Description
LDAP Group Authorization If checked, user authentication is also done on the group level for LDAP
check box users that are not found in the local user database.
If you check this box, Cisco IMC enables the Configure Group button.
Group Name column The name of the group in the LDAP server database that is authorized
to access the server.
Group Domain column The LDAP server domain the group must reside in.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
85
Managing User Accounts
LDAP Certificates Overview
Name Description
Role column The role assigned to all users in this LDAP server group. This can be
one of the following:
• read-only—A user with this role can view information but cannot
make any changes.
• user—A user with this role can perform the following tasks:
• View all information
• Manage the power control options such as power on, power
cycle, and power off
• Launch the KVM console and virtual media
• Clear all logs
• Toggle the locator LED
• Set time zone
• Ping
• admin—A user with this role can perform all actions available
through the GUI, CLI, and IPMI.
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
86
Managing User Accounts
Exporting an LDAP CA Certificate
Name Description
Download Status This field displays the status of the LDAP CA
certificate download.
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
87
Managing User Accounts
Exporting an LDAP CA Certificate
Name Description
Export to Remote Location Selecting this option allows you to choose the
certificate from a remote location and export it. Enter
the following details:
• • TFTP Server
• FTP Server
• SFTP Server
• SCP Server
• HTTP Server
Export to Local Desktop Selecting this option allows you to choose the
certificate stored on a drive that is local to the
computer and export it.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
88
Managing User Accounts
Downloading an LDAP CA Certificate
Note Only CA certificates or chained CA certificates must be used in Cisco IMC. By default, CA certificate is in
.cer format. If it is a chained CA certificate, then it needs to be converted to .cer format before downloading
it to Cisco IMC.
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
89
Managing User Accounts
Downloading an LDAP CA Certificate
Name Description
Download from remote location Selecting this option allows you to choose the certificate from a remote
radio button location and download it. Enter the following details:
• • TFTP Server
• FTP Server
• SFTP Server
• SCP Server
• HTTP Server
Download through browser client Selecting this option allows you to navigate to the certificate stored on
radio button a drive that is local to the computer running the Cisco IMC GUI.
When you select this option, Cisco IMC GUI displays a Browse button
that lets you navigate to the file you want to import.
Paste Certificate content radio Selecting this option allows you to copy the entire content of the signed
button certificate and paste it in the Paste certificate content text field.
Note Ensure the certificate is signed before uploading.
Download Certificate button Allows you to download the certificate to the server.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
90
Managing User Accounts
Testing LDAP Binding
Note If you checked the Enable Encryption and the Enable Binding CA Certificate check boxes, enter the fully
qualified domain name (FQDN) of the LDAP server in the LDAP Server field. To resolve the FQDN of the
LDAP server, configure the preferred DNS of Cisco IMC network with the appropriate DNS IP address.
Procedure
Name Description
Username field Enter the user name.
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
91
Managing User Accounts
Viewing User Sessions
Name Description
Session ID column The unique identifier for the session.
IP Address column The IP address from which the user accessed the server. If this is a serial
connection, it displays N/A.
Type column The type of session the user chose to access the server. This can be one
of the following:
• webgui— indicates the user is connected to the server using the
web UI.
• CLI— indicates the user is connected to the server using CLI.
• serial— indicates the user is connected to the server using the serial
port.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
92
CHAPTER 8
Configuring Chassis Related Settings
This chapter includes the following sections:
• Managing Server Power, on page 93
• Pinging a Hostname/IP Address from the Web UI, on page 93
• Selecting a Time Zone, on page 94
Procedure
Procedure
Step 1 In the toolbar above the work pane, click the Ping icon.
Step 2 In the Ping Details dialog box, update the following fields:
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
93
Configuring Chassis Related Settings
Selecting a Time Zone
Actions Description
*Hostname/IP Address field Hostname or IP address you want to reach out to.
*Number of Retries field The maximum number of retries allowed to ping the
IP address. The default value is 3. The valid range is
from 1 to 10.
Procedure
Step 4 In the Select Timezone pop-up screen, mouse over the map and click on the location to select your time zone
or choose your time zone from the Timezone drop-down menu.
Step 5 Click Save.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
94
CHAPTER 9
Configuring Network-Related Settings
This chapter includes the following sections:
• Server NIC Configuration, on page 95
• Common Properties Configuration, on page 96
• Network Security Configuration, on page 98
• Network Time Protocol Settings, on page 99
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
95
Configuring Network-Related Settings
Common Properties Configuration
NIC Interface field The network interface that is selected in the NIC Mode field.
Dynamic DNS
Dynamic DNS (DDNS) is used to add or update the resource records on the DNS server from Cisco IMC.
You can enable Dynamic DNS by using either the web UI or CLI. When you enable the DDNS option, the
DDNS service records the current hostname, domain name, and the management IP address and updates the
resource records in the DNS server from Cisco IMC.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
96
Configuring Network-Related Settings
Configuring Common Properties
Note The DDNS server deletes the prior resource records (if any) and adds the new resource records to the DNS
server if any one of the following DNS configuration is changed:
• Hostname
• Domain name in the LDAP settings
• When DDNS and DHCP are enabled, if the DHCP gets a new IP address or DNS IP or domain name
due to a change in a network or a subnet.
• When DHCP is disabled and if you set the static IP address by using CLI or web UI.
• When you enter the dns-use-dhcp command.
Dynamic DNS Update Domain— You can specify the domain. The domain could be either main domain or
any sub-domain. This domain name is appended to the hostname of the Cisco IMC for the DDNS update.
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
97
Configuring Network-Related Settings
Network Security Configuration
Procedure
Name Description
Enable IP Blocking check box Check this box to enable IP blocking.
IP Blocking Fail Count field The number of times a user can attempt to log in unsuccessfully before
the system locks that user out for a specified length of time.
The number of unsuccessful login attempts must occur within the time
frame specified in the IP Blocking Fail Window field.
Enter an integer between 3 and 10.
IP Blocking Fail Window field The length of time, in seconds, in which the unsuccessful login attempts
must occur in order for the user to be locked out.
Enter an integer between 60 and 120.
IP Blocking Penalty Time field The number of seconds the user remains locked out if they exceed the
maximum number of login attempts within the specified time window.
Enter an integer between 300 and 900.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
98
Configuring Network-Related Settings
Network Time Protocol Settings
Name Description
Enable IP Filtering check box Check this box to enable IP filtering.
IP Filter fields To provide secure access to the server, you can now set a filter to allow
only a selected set of IPs to access it. This option provides four slots for
storing IP addresses (IP Filter 1, 2, 3, and 4). You can either assign a
single IP address or a range of IP addresses while setting the IP filters.
Once you set the IP filter, you would be unable to access the server using
any other IP address.
Note To enable the NTP service, it is preferable to specify the IP address of a server rather than the DNS address.
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
99
Configuring Network-Related Settings
Configuring Network Time Protocol Settings
Name Description
Enable NTP Check this box to enable the NTP service.
Server 1 The IP/DNS address of one of the four servers that act as an NTP server
or the time source server.
Server 2 The IP/DNS address of one of the four servers that act as an NTP server
or the time source server.
Server 3 The IP/DNS address of one of the four servers that act as an NTP server
or the time source server.
Server 4 The IP/DNS address of one of the four servers that act as an NTP server
or the time source server.
Status message Indicates whether or not the server is able to synchronize its time with
the remote NTP server. This can be one of the following:
• synchronized to NTP server (RefID) at stratum 7— When the
NTP service is enabled and multiple or individual IPv4 or IPv6
based NTP servers are added.
• unsynchronized — When the NTP service is enabled and an
unknown or unreachable server is added.
• NTP service disabled — When the NTP service is disabled.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
100
CHAPTER 10
Managing Storage Adapters
This chapter includes the following sections:
• Managing Storage Adapters, on page 101
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
101
Managing Storage Adapters
Creating Virtual Drive from Unused Physical Drives
Controller security can be enabled, disabled, or modified independently. However, local and remote key
management applies to all the controllers on the server. Therefore security action involving switching the key
management modes must be performed with caution. In a scenario where both controllers are secure, and you
decide to move one of the controllers to a different mode, you need to perform the same operation on the other
controller as well.
Consider the following two scenarios:
• Scenario 1—Key management is set to remote; both controllers are secure and use remote key
management. If you now wish to switch to local key management, switch the key management for each
controller and disable remote key management.
• Scenario 2—Key management is set to local; both controllers are secure and use local key management.
If you now wish to switch to remote key management, enable remote key management and switch the
key management for each controller.
If you do not modify the controller security method on any one of the controllers, it renders the secure key
management in an unsupported configuration state.
Procedure
Step 4 In the Create Virtual Drive from Unused Physical Drives dialog box, select the RAID level for the new
virtual drives:
This can be one of the following:
• Raid 0—Simple striping.
• Raid 1—Simple mirroring.
• Raid 5—Striping with parity.
• Raid 6—Striping with two parity drives.
• Raid 10—Spanned mirroring.
• Raid 50—Spanned striping with parity.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
102
Managing Storage Adapters
Creating Virtual Drive from Unused Physical Drives
Step 5 In the Create Drive Groups area, choose one or more physical drives to include in the group.
Use the >> button to add the drives to the Drive Groups table. Use the << button to remove physical drives
from the drive group.
Note The size of the smallest physical drive in the drive group defines the maximum size used for all the
physical drives. To ensure maximum use of space for all physical drives, it is recommended that
the size of all the drives in the drive group are similar.
Note Cisco IMC manages only RAID controllers and not HBAs attached to the server.
Step 6 In the Virtual Drive Properties area, update the following properties:
Name Description
Virtual Drive Name field The name of the new virtual drive you want to create.
Cache Policy drop-down list The cache policy used for buffering reads.
Disk Cache Policy drop-down list This can be one of the following
• Unchanged— The disk cache policy is unchanged.
• Enabled— Allows IO caching on the disk.
• Disabled— Disallows disk caching.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
103
Managing Storage Adapters
Creating Virtual Drive from an Existing Drive Group
Name Description
Size field The size of the virtual drive you want to create. Enter a value and select
one of the following units:
• MB
• GB
• TB
Step 7 Click the Generate XML API Request button to generate an API request.
Step 8 Click Close.
Step 9 Click Create Virtual Drive.
Procedure
Step 4 In the Create Virtual Drive from an Existing Virtual Drive Group dialog box, select the virtual drive
whose drive group you want to use to create a new virtual drive.
Step 5 In the Virtual Drive Properties area, update the following properties:
Name Description
Virtual Drive Name field The name of the new virtual drive you want to create.
Cache Policy drop-down list The cache policy used for buffering reads.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
104
Managing Storage Adapters
Setting a Virtual Drive to Transport Ready State
Name Description
Write Policy drop-down list This can be one of the following
• Write Through— Data is written through the cache and to the
physical drives. Performance is improved, because subsequent
reads of that data can be satisfied from the cache.
• Write Back— Data is stored in the cache, and is only written to
the physical drives when space in the cache is needed. Virtual drives
requesting this policy fall back to Write Through caching when
the BBU cannot guarantee the safety of the cache in the event of a
power failure.
• Write Back Bad BBU—With this policy, write caching remains
Write Back even if the battery backup unit is defective or
discharged.
Disk Cache Policy drop-down list This can be one of the following
• Unchanged— The disk cache policy is unchanged.
• Enabled— Allows IO caching on the disk.
• Disabled— Disallows disk caching.
Size field The size of the virtual drive you want to create. Enter a value and select
one of the following units:
• MB
• GB
• TB
Step 6 Click the Generate XML API Request button to generate an API request.
Step 7 Click Close.
Step 8 Click Create Virtual Drive.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
105
Managing Storage Adapters
Setting a Virtual Drive as Transport Ready
disk data format, allowing you to move the drive. When you move a virtual drive, all other drives belonging
to the same drive group inherit the same change as the moved drive.
When the last configured physical drive on the group is removed from the current controller, the drive group
becomes foreign and all foreign configuration rules apply to the group. However, the Transport Ready feature
does not change any foreign configuration behavior.
You can also clear a virtual drive from the Transport Ready state. This makes the virtual drive available to
the operating systems.
Following restrictions apply to a transport ready virtual drive:
• Only a maximum of 16 transport ready drive groups are currently supported.
• This feature is not supported on high availability.
• A virtual drive cannot be set as transport ready under these conditions:
• When a virtual drive of a drive group is being reconstructed
• When a virtual drive of a drive group contains a pinned cache
• When a virtual drive of a drive group is marked as cacheable or associated with a cachecade virtual
drive
• If a virtual drive is a cachecade virtual drive
• If a virtual drive is offline
• If a virtual drive is a bootable virtual drive
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
106
Managing Storage Adapters
Clearing a Virtual Drive from Transport Ready State
Name Description
Initialize Type drop-down list Allows you to select the initialization type using which you can set the
selected virtual drive as transport ready. This can be one of the following:
• Exlude All— Excludes all the dedicated hot spare drives.
• Include All— Includes any exclusively available or shared
dedicated hot spare drives.
• Include Dedicated Hot Spare Drive— Includes exclusive
dedicated hot spare drives.
Set Transport Ready button Sets the selected virtual drive as transport ready.
Note When you set a virtual drive to transport ready all the physical drives associated with it are displayed
as Ready to Remove.
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
107
Managing Storage Adapters
Clearing Foreign Configuration
Procedure
Important This task clears all foreign configuration on the controller. Also, all configuration information from all physical
drives hosting foreign configuration is deleted. This action cannot be reverted.
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
108
Managing Storage Adapters
Clearing a Boot Drive
Important This task clears the boot drive configuration on the controller. This action cannot be reverted.
Procedure
Disabling a JBOD
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
109
Managing Storage Adapters
Retrieving Storage Firmware Logs for a Controller
Procedure
Procedure
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
110
Managing Storage Adapters
Preparing a Drive for Removal
Note You can perform this task only on physical drives that display the Unconfigured Good status.
Procedure
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
111
Managing Storage Adapters
Making a Dedicated Hot Spare
Procedure
Step 6 In the Virtual Drive Details area, update the following properties:
Name Description
Virtual Drive Number drop-down Select the virtual drive to which you want to dedicate the physical drive
list as hot spare.
Virtual Drive Name field The name of the selected virtual drive.
Make Dedicated Hot Spare button Creates the dedicated hot spare.
Cancel button Closes the dialog box without saving any changes made while the dialog
box was open.
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
112
Managing Storage Adapters
Removing a Drive from Hot Spare Pools
Procedure
Procedure
Step 7 To enable the JBOD mode for the physical drive, click Set State as JBOD.
Step 8 Click OK to confirm.
The Set State as Unconfigured Good option is enabled.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
113
Managing Storage Adapters
Setting a Physical Drive as a Controller Boot Drive
Procedure
Procedure
Step 6 Choose the type of initialization you want to use for the virtual drive.
This can be one of the following:
• Fast Initialize—This option allows you to start writing data to the virtual drive immediately.
• Full Initialize—A complete initialization is done on the new configuration. You cannot write data to
the new virtual drive until the initialization is complete.
Step 7 Click Initialize VD to initialize the drive, or Cancel to close the dialog box without making any changes.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
114
Managing Storage Adapters
Set as Boot Drive
Step 8 To view the status of the task running on the drive, in the Operations area, click Refresh.
The following details are displayed:
Name Description
Operation Name of the operation that is in progress on the drive.
Elapsed Time in secs The number of seconds that have elapsed since the
operation began.
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
115
Managing Storage Adapters
Editing a Virtual Drive
Name Description
Select RAID Level to migrate Select the RAID level to which you want to migrate. Migrations are
drop-down list allowed for the following RAID levels:
• RAID 0 to RAID 1
• RAID 0 to RAID 5
• RAID 0 to RAID 6
• RAID 1 to RAID 0
• RAID 1 to RAID 5
• RAID 1 to RAID 6
• RAID 5 to RAID 0
• RAID 5 to RAID 1
• RAID 5 to RAID 6
When you are migrating from one raid level to another, the data arms
of the new RAID level should be equal to or greater than the existing
one.
In case of RAID 6, the data arms will be number of drives minus two,
as RAID 6 has double distributed parity. For example, when you create
RAID 6 with eight drives, the number of data arms will be 8 – 2 = 6. In
this case, if you are migrating from RAID 6 to RAID 0, RAID 0 must
have a minimum of six drives. If you select lesser number of drives then
Edit or Save button will be disabled.
If you are adding, you can migrate to RAID 0 as you will not be deleting
any drives.
Note RAID level migration is not supported in the following cases:
• When there are multiple virtual drives in a RAID group.
• With a combination of SSD/HDD RAID groups.
Step 7 From the Write Policy drop-down list in the Virtual Drive Properties area, choose one of the following:
• Write Through— Data is written through the cache and to the physical drives. Performance is improved,
because subsequent reads of that data can be satisfied from the cache.
• Write Back— Data is stored in the cache, and is only written to the physical drives when space in the
cache is needed. Virtual drives requesting this policy fall back to Write Through caching when the BBU
cannot guarantee the safety of the cache in the event of a power failure.
• Write Back Bad BBU—With this policy, write caching remains Write Back even if the battery backup
unit is defective or discharged.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
116
Managing Storage Adapters
Deleting a Virtual Drive
Important This task deletes a virtual drive, including the drives that run the booted operating system. So back up any
data that you want to retain before you delete a virtual drive.
Procedure
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
117
Managing Storage Adapters
Viewing Storage Controller Logs
Procedure
Procedure
Name Description
Severity column The event severity. This can be one of the following:
• Emergency
• Alert
• Critical
• Error
• Warning
• Notice
• Informational
• Debug
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
118
CHAPTER 11
Configuring Communication Services
This chapter includes the following sections:
• Configuring HTTP, on page 119
• Configuring SSH, on page 120
• Configuring Redfish, on page 121
• Configuring XML API, on page 121
• Configuring IPMI, on page 122
• Configuring SNMP, on page 123
Configuring HTTP
Before you begin
You must log in as a user with admin privileges to perform this task.
Procedure
Name Description
HTTP/S Enabled check box Whether HTTP and HTTPS are enabled on the Cisco IMC.
Redirect HTTP to HTTPS If enabled, all attempts to communicate via HTTP are redirected to the
Enabled check box equivalent HTTPS address.
We strongly recommend that you enable this option if you enable HTTP.
HTTP Port field The port to use for HTTP communication. The default is 80.
HTTPS Port field The port to use for HTTPS communication. The default is 443
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
119
Configuring Communication Services
Configuring SSH
Name Description
Session Timeout field The number of seconds to wait between HTTP requests before the Cisco
IMC times out and terminates the session.
Enter an integer between 60 and 10,800. The default is 1,800 seconds.
Max Sessions field The maximum number of concurrent HTTP and HTTPS sessions allowed
on the Cisco IMC.
This value may not be changed.
Active Sessions field The number of HTTP and HTTPS sessions currently running on the
Cisco IMC.
Configuring SSH
Before you begin
You must log in as a user with admin privileges to configure SSH.
Procedure
Name Description
SSH Enabled check box Whether SSH is enabled on the Cisco IMC.
SSH Port field The port to use for secure shell access. The default is 22.
SSH Timeout field The number of seconds to wait before the system considers an SSH
request to have timed out.
Enter an integer between 60 and 10,800. The default is 1,800 seconds.
Max Sessions field The maximum number of concurrent SSH sessions allowed on the Cisco
IMC.
This value may not be changed.
Active Sessions field The number of SSH sessions currently running on the Cisco IMC.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
120
Configuring Communication Services
Configuring Redfish
Configuring Redfish
Before you begin
You must log in as a user with admin privileges to configure SSH.
Procedure
Name Description
Redfish Enabled check box Whether Redfish is enabled on the Cisco IMC.
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
121
Configuring Communication Services
Configuring IPMI
Name Description
XML API Enabled check box Whether API access is allowed on this server.
Max Sessions field The maximum number of concurrent API sessions allowed on the Cisco
IMC.
This value may not be changed.
Active Sessions field The number of API sessions currently running on the Cisco IMC.
Configuring IPMI
IPMI Over LAN
Intelligent Platform Management Interface (IPMI) defines the protocols for interfacing with a service processor
embedded in a server platform. This service processor is called a Baseboard Management Controller (BMC)
and resides on the server motherboard. The BMC links to a main processor and other on-board elements using
a simple serial bus.
During normal operations, IPMI lets a server operating system obtain information about system health and
control system hardware. For example, IPMI enables the monitoring of sensors, such as temperature, fan
speeds and voltages, for proactive problem detection. If server temperature rises above specified levels, the
server operating system can direct the BMC to increase fan speed or reduce processor speed to address the
problem.
Procedure
Name Description
Enabled check box Whether IPMI access is allowed on this server.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
122
Configuring Communication Services
Configuring SNMP
Name Description
Privilege Level Limit drop-down The highest privilege level that can be assigned to an IPMI session on
list this server. This can be one of the following:
• read-only—IPMI users can view information but cannot make any
changes. If you select this option, IPMI users with the
"Administrator", "Operator", or "User" user roles can only create
read-only IPMI sessions, regardless of their other IPMI privileges.
• user—IPMI users can perform some functions but cannot perform
administrative tasks. If you select this option, IPMI users with the
"Administrator" or "Operator" user role can create user and
read-only sessions on this server.
• admin—IPMI users can perform all available actions. If you select
this option, IPMI users with the "Administrator" user role can create
admin, user, and read-only sessions on this server.
Encryption Key field The IPMI encryption key to use for IPMI communications.
Randomize button Enables you to change the IPMI encryption key to a random value.
Configuring SNMP
SNMP
The Cisco UCS E-Series Rack-Mount Servers support the Simple Network Management Protocol (SNMP)
for viewing the server configuration and status, and for sending fault and alert information by SNMP traps.
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
123
Configuring Communication Services
Configuring SNMP Properties
Name Description
SNMP Enabled check box Whether this server sends SNMP traps to the designated host.
Note After you check this check box, you need to click Save
Changes before you can configure SNMP users or traps.
SNMP Port field The port on which Cisco IMC SNMP agent runs.
Enter an SNMP port number within the range 1 to 65535. The default
port number is 161.
Note The port numbers that are reserved for system calls, such as
22,23,80,123,443,623,389,636,3268,3269 and 2068, cannot
be used as an SNMP port.
Access Community String field The default SNMP v1 or v2c community name Cisco IMC includes on
any SNMP get operations.
Enter a string up to 18 characters.
Trap Community String field The name of the SNMP community group used for sending SNMP trap
to other devices.
Enter a string up to 18 characters.
Note This field is visible only for SNMP v1 and v2c users. SNMP
v3 users need to use SNMP v3 credentials.
System Contact field The system contact person responsible for the SNMP implementation.
Enter a string up to 64 characters, such as an email address or a name
and telephone number.
System Location field The location of the host on which the SNMP agent (server) runs.
Enter a string up to 64 characters.
SNMP Input Engine ID field User-defined unique identification of the static engine.
SNMP Engine ID field Unique string to identify the device for administration purpose. This is
generated from the SNMP Input Engine ID if it is already defined, else
it is derived from the BMC serial number.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
124
Configuring Communication Services
Configuring SNMP Trap Settings
What to do next
Configure SNMP trap settings.
Procedure
Step 6 In the Trap Details dialog box, complete the following fields:
Name Description
ID field The trap destination ID. This value cannot be modified.
Version drop-down list The SNMP version and model used for the trap. This can be one of the
following:
• V2
• V3
Type The type of trap to send. This can be one of the following:
• Trap: If this option is chosen, the trap will be sent to the destination
but you do not receive any notifications.
• Inform: You can choose this option only for V2 users. If chosen,
you will receive a notification when a trap is received at the
destination.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
125
Configuring Communication Services
Sending a Test SNMP Trap Message
Name Description
User drop-down list The drop-down list displays all available users, select a user from the
list.
Destination Address field Address to which the SNMP trap information is sent. You can set an
IPv4 or IPv6 address or a domain name as the trap destination.
Port The port the server uses to communicate with the trap destination.
Enter a trap destination port number within the range 1 to 65535.
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
126
Configuring Communication Services
Configuring SNMP Users
Procedure
Name Description
Add User button Click an available row in the table then click this button to add a new
SNMP user.
Modify User button Select the user you want to change in the table then click this button to
modify the selected SNMP user.
Delete User button Select the user you want to delete in the table then click this button to
delete the selected SNMP user.
Procedure
Step 5 In the SNMP User Details dialog box, update the following properties:
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
127
Configuring Communication Services
Configuring SNMP Users
Name Description
ID field The unique identifier for the user. This field cannot be changed.
Security Level drop-down list The security level for this user. This can be one of the following:
• no auth, no priv—The user does not require an authorization or
privacy password.
• auth, no priv—The user requires an authorization password but
not a privacy password. If you select this option, Cisco IMC enables
the Auth fields described below.
• auth, priv—The user requires both an authorization password and
a privacy password. If you select this option, Cisco IMC enables
the Auth and Privacy fields.
Auth Type drop-down The authorization type. This can be one of the following:
• MD5
• SHA
Auth Password field The authorization password for this SNMP user.
Enter between 8 and 64 characters or spaces.
Note Cisco IMC automatically trims leading or trailing spaces.
Confirm Auth Password field The authorization password again for confirmation purposes.
Privacy Type drop-down The privacy type. This can be one of the following:
• DES
• AES
Privacy Password field The privacy password for this SNMP user.
Enter between 8 and 64 characters or spaces.
Note Cisco IMC automatically trims leading or trailing spaces.
Confirm Privacy Password field The authorization password again for confirmation purposes.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
128
Configuring Communication Services
Configuring SNMP Users
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
129
Configuring Communication Services
Configuring SNMP Users
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
130
CHAPTER 12
Managing Firmware
This chapter includes the following sections:
• Cisco IMC Firmware, on page 131
• Viewing Firmware Components, on page 132
• Updating the Firmware, on page 133
• Activating the Firmware, on page 134
You can upload a firmware image from either a local file system or a TFTP server.
• Bootloader firmware—The bootloader firmware cannot be installed from the Cisco IMC. You can install
this firmware using the Host Upgrade Utility.
Firmware for the Hard Disk Drive (HDD) can also be installed from the same interfaces as the adapter firmware
mentioned above.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
131
Managing Firmware
Viewing Firmware Components
Name Description
Activate button Opens a dialog box that allows you to select which
available firmware version you would like to activate
on the server.
Important If any firmware or BIOS updates are in
progress, do not activate new firmware
until those tasks complete.
Component column List of components available for which you can update
the firmware.
Backup Version column The alternate firmware version installed on the server,
if any. The backup version is not currently running.
To activate it, click Activate.
Note When you install new firmware, any
existing backup version is deleted and the
new firmware becomes the backup version.
You must manually activate the new
firmware if you want the server to run the
new version.
Bootloader Version column The bootloader version associated with the boot-loader
software of the component.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
132
Managing Firmware
Updating the Firmware
Procedure
Name Description
Install Firmware through Browser Client radio If the firmware package resides on a local machine,
button click this radio button.
Install Firmware through Remote Server radio If the firmware package resides on a remote server,
button click this radio button.
Step 4 To install the firmware through the browser client, click Browse and navigate to the firmware file that you
want to install.
Step 5 After you select the file, click Install Firmware.
Step 6 To update the firmware using remote server, select the remote server type from the Install Firmware from
drop-down list. This could be one of the following:
• TFTP
• FTP
• SFTP
• SCP
• HTTP
Step 7 Depending on the remote server type you choose, enter details in the server's IP/Hostname and Image Path
and Filename fields.
Once you install the firmware, the new image replaces the non-active image. You can activate the image after
it is installed.
Important For FTP, SFTP, and SCP server types, you need to provide user credentials.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
133
Managing Firmware
Activating the Firmware
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
134
CHAPTER 13
Viewing Faults and Logs
This chapter includes the following sections:
• Faults Summary, on page 135
• Fault History, on page 137
• Cisco IMC Log, on page 139
• System Event Log, on page 141
• Logging Controls, on page 143
Faults Summary
Viewing the Fault Summary
Procedure
Name Description
Total Displays the total number of rows in the Fault Entries
table.
Column drop-down list Allows you to choose the columns you wish to be
displayed.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
135
Viewing Faults and Logs
Viewing the Fault Summary
Name Description
Show drop-down list Customize the way you want to view fault entries
using filters. These can be:
• Quick Filter - Default view.
• Advanced Filter - Filter options to display the
fault entries based on one or more criteria. Using
the matching rule, you can view entries matching
all the rules or any one combination of rules you
specified in the Filter fields.
Click Go to view the entries matching the filter
criteria that you set.
Click the Save icon to save the filter criteria that
you set. This becomes a user-defined filter which
you can use later.
Note The user-defined filter appears in the
Manage Preset Filters dialog box.
Name Description
Time The time when the fault occurred.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
136
Viewing Faults and Logs
Fault History
Name Description
DN The distinguished name (DN) is a hierarchical
representation of the device endpoint and its instance
on the server.
Probable Cause The unique identifier associated with the event that
caused the fault.
Fault History
Viewing Faults History
Procedure
Name Description
Total Displays the total number of rows in the Fault History
table.
Column drop-down list Allows you to choose the columns you wish to be
displayed.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
137
Viewing Faults and Logs
Viewing Faults History
Name Description
Show drop-down list Customize the way you want to view fault history
entries using filters. These can be:
• Quick Filter - Default view.
• Advanced Filter - Filter options to display the
entries based on one or more criteria. Using the
matching rule, you can view entries matching all
the rules or any one combination of rules you
specified in the Filter fields.
Click Go to view the entries matching the filter
criteria that you set.
Click the Save icon to save the filter criteria that
you set. This becomes a user-defined filter which
you can use later.
Note The user-defined filter appears in the
Manage Preset Filters dialog box.
Name Description
Time The time when the fault occurred.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
138
Viewing Faults and Logs
Cisco IMC Log
Name Description
Severity This can be one of the following:
• Emergency
• Alert
• Critical
• Error
• Warning
• Notice
• Informational
• Debug
Probable Cause The unique identifier associated with the event that
caused the fault.
What to do next
Name Description
Clear Log button Clears all log files.
Note This option is only available if your user
ID is assigned the admin or user user role.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
139
Viewing Faults and Logs
Viewing the Cisco IMC Log
Name Description
Total Displays the total number of rows in the Cisco IMC
Log table.
Column drop-down list Allows you to choose the columns you wish to be
displayed.
Show drop-down list Customize the way you want to view Cisco IMC log
entries using filters. These can be:
• Quick Filter - Default view.
• Advanced Filter - Filter options to display the
log entries based on one or more criteria. Using
the matching rule, you can view entries matching
all the rules or any one combination of rules you
specified in the Filter fields.
Click Go to view the entries matching the filter
criteria that you set.
Click the Save icon to save the filter criteria that
you set. This becomes a user-defined filter which
you can use later.
Note The user-defined filter appears in the
Manage Preset Filters dialog box.
Name Description
Time column The date and time the event occurred.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
140
Viewing Faults and Logs
System Event Log
Name Description
Severity column The event severity. This can be one of the following:
• Emergency
• Alert
• Critical
• Error
• Warning
• Notice
• Informational
• Debug
Name Description
Clear Log button Clears all events from the log file.
Note This option is only available if your user
ID is assigned the admin or user user role.
Column drop-down list Allows you to choose the columns you wish to be
displayed.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
141
Viewing Faults and Logs
Viewing System Event Logs
Name Description
Show drop-down list Customize the way you want to view events using
filters. These can be:
• Quick Filter - Default view.
• Advanced Filter - Filter options to display the
events based on one or more criteria. Using the
matching rule, you can view entries matching all
the rules or any one combination of rules you
specified in the Filter fields.
Click Go to view the entries matching the filter
criteria that you set.
Click the Save icon to save the filter criteria that
you set. This becomes a user-defined filter which
you can use later.
Note The user-defined filter appears in the
Manage Preset Filters dialog box.
Name Description
Time column The date and time the event occurred.
Severity column The severity field includes both text and a color-coded icon. For the
icon, green indicates normal operation, yellow is informational, and
warning, critical, and non-recoverable errors are shown in shades of red.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
142
Viewing Faults and Logs
Logging Controls
Logging Controls
Viewing Logging Controls
Procedure
Name Description
Enabled check box If checked, the Cisco IMC sends log messages to the Syslog server
named in the IP Address field.
Host Name/IP Address field The address of the Syslog server on which the Cisco IMC log should
be stored. You can set an IPv4 or IPv6 address or a domain name as the
remote system address.
Port field Enter a destination port number of the Syslog server within the range 1
to 65535. The default port number is 514.
Minimum Severity to Report field Specify the lowest level of messages that will be included in the remote
logs. You can select one of the following:
• Emergency
• Alert
• Critical
• Error
• Warning
• Notice
• Informational
• Debug
Note The Cisco IMC does not remotely log any messages with a severity below the selected severity.
For example, if you select Error, then the Cisco IMC remote log contains all messages with the
severity Emergency, Alert, Critical, or Error. It does not show Warning, Notice, Informational,
or Debug messages.
Local Logging
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
143
Viewing Faults and Logs
Sending the Cisco IMC Log to a Remote Server
This area displays only the Minimum Severity to Report drop-down list as shown in the table above. You
can specify the lowest level of messages to be included in the local log
What to do next
Procedure
Name Description
Enabled check box If checked, the Cisco IMC sends log messages to the Syslog server
named in the IP Address field.
Host Name/IP Address field The address of the Syslog server on which the Cisco IMC log should
be stored. You can set an IPv4 or IPv6 address or a domain name as the
remote system address.
Port field Enter a destination port number of the Syslog server within the range 1
to 65535. The default port number is 514.
Step 4 (Optional) In the Minimum Severity to Report drop-down list, specify the lowest level of messages that
will be included in the remote logs.
You can select one of the following, in decreasing order of severity:
• Emergency
• Alert
• Critical
• Error
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
144
Viewing Faults and Logs
Configuring the Cisco IMC Log Threshold
• Warning
• Notice
• Informational
• Debug
Note Cisco IMC does not remotely log any messages with a severity below the selected severity. For
example, if you select Error, then the Cisco IMC remote log will contain all messages with the
severity Emergency, Alert, Critical, or Error. It will not show Warning, Notice, Informational, or
Debug messages.
Procedure
Note Cisco IMC does not log any messages with a severity below the selected severity. For example, if
you select Error, then the Cisco IMC log will contain all messages with the severity Emergency,
Alert, Critical, or Error. It will not show Warning, Notice, Informational, or Debug messages.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
145
Viewing Faults and Logs
Sending a Test Cisco IMC Log to a Remote Server
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
146
CHAPTER 14
Server Utilities
This chapter includes the following sections:
• Exporting Technical Support Data, on page 147
• Resetting to Factory Default, on page 148
• Exporting and Importing the Cisco IMC Configuration, on page 149
• Generating Non Maskable Interrupts to the Host, on page 154
• Adding or Updating the Cisco IMC Banner, on page 154
• Viewing Cisco IMC Last Reset Reason, on page 155
• Downloading Hardware Inventory to a Local File, on page 156
• Exporting Hardware Inventory Data to a Remote Server, on page 156
Procedure
What to do next
Provide the generated report file to Cisco TAC.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
147
Server Utilities
Downloading Technical Support Data to a Local File
Procedure
Name Description
Generate Technical Support Data Cisco IMC disables this radio button when there is no technical support
radio button data file to download.
Click Generate to create the data file. When data collection is complete,
click Download Technical Support Data to Local File in the Actions
area to download the file.
Download to local file radio button Cisco IMC enables this radio button when a technical support data file
is available to download.
To download the existing file, select this option and click Download.
Note If the server includes any of the supported network adapter
cards, the data file also includes technical support data from
the adapter card.
Generate button Allows you to generate the technical support data file.
Download button Allows you to download the technical support data file after it is
generated.
Step 5 Click Generate to create the data file. When data collection is complete, click Download Technical Support
Data to Local File in the Actions area to download the file..
What to do next
Provide the generated report file to Cisco TAC.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
148
Server Utilities
Exporting and Importing the Cisco IMC Configuration
This procedure is not part of the normal server maintenance. After you reset the server components, you are
logged off and must log in again. You might also lose connectivity and might need to reconfigure the network
settings. Some of the inventory information might not be available during this transition.
When you reset the BMC to factory settings, the serial number is displayed in the Cisco IMCXXXXXX
format, where XXXXXX is the serial number of the server.
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
149
Server Utilities
Exporting the Cisco IMC Configuration
• Network settings
• Technical support
• Logging control for local and remote logs
• Power policies
• BIOS - BIOS Parameters
• Communication services
• Remote presence
• User management - LDAP
• SNMP
Note For security reasons, this operation does not export user accounts or the server certificate.
Procedure
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
150
Server Utilities
Exporting the Cisco IMC Configuration
Name Description
Export To drop-down list The location where you want to save the XML configuration file. This
can be one of the following:
• Local: Select this option and click Export to save the XML
configuration file to a drive that is local to the computer running
the Cisco IMC GUI..
When you select this option, Cisco IMC GUI displays a File
Download dialog box that lets you navigate to the location to which
the configuration file should be saved.
• Remote Server: Select this option to import the XML configuration
file from a remote server.
When you select this option, Cisco IMC GUI displays the remote
server fields.
Export To drop-down list The remote server type. This can be one of the following:
• TFTP Server
• FTP Server
• SFTP Server
• SCP Server
• HTTP Server
Note If you chose SCP or SFTP as the remote server type while
performing this action, a pop-up window is displayed with
the message Server (RSA) key fingerprint is
<server_finger_print _ID> Do you wish to continue?. Click
Yes or No depending on the authenticity of the server
fingerprint.
The fingerprint is based on the host's public key and helps
you to identify or verify the host you are connecting to.
Server IP/Hostname field The IPv4 or IPv6 address, or hostname of the server to which the
configuration file will be exported. Depending on the remote server type
selected in the Export to drop-down list, the name of the field may vary.
Path and Filename field The path and filename Cisco IMC should use when exporting the file
to the remote server.
Username The username the system should use to log in to the remote server. This
field does not apply if the protocol is TFTP or HTTP.
Password The password for the remote server username. This field does not apply
if the protocol is TFTP or HTTP.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
151
Server Utilities
Importing the Cisco IMC Configuration
Name Description
Passphrase The passphrase that uses the AES256 algorithm to encrypt the LDAP
and SNMP v3 user passwords in the exported configuration files. Enter
a string of 6 to 127 characters. Do not enter the following characters: !
# $ & < > ? ; ' | ` ~ \ % ^ ( )"
Procedure
Name Description
Import From drop-down list The location of the XML configuration file. This can be one of the
following:
• Local: Select this option to import the XML configuration file to
a drive that is local to the computer running Cisco IMC GUI.
When you select this option, Cisco IMC GUI displays a Browse
button that lets you navigate to the file you want to import.
• Remote Server: Select this option to import the XML configuration
file from a remote server.
When you select this option, Cisco IMC GUI displays the remote
server fields.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
152
Server Utilities
Importing the Cisco IMC Configuration
Name Description
Import From drop-down list Note These options are available only when you choose Remote.
Note If you chose SCP or SFTP as the remote server type while
performing this action, a pop-up window is displayed with
the message Server (RSA) key fingerprint is
<server_finger_print _ID> Do you wish to continue?. Click
Yes or No depending on the authenticity of the server
fingerprint.
The fingerprint is based on the host's public key and helps
you to identify or verify the host you are connecting to.
Server IP/Hostname field The IPv4 or IPv6 address, or hostname of the server on which the
configuration file resides. Depending on the remote server type selected
in the Import From drop-down list, the name of the field might vary.
Path and Filename field The path and filename of the configuration file on the remote server.
Username The username the system should use to log in to the remote server. This
field does not apply if the protocol is TFTP or HTTP.
Password The password for the remote server username. This field does not apply
if the protocol is TFTP or HTTP.
Passphrase The passphrase that uses the AES256 algorithm to encrypt the LDAP
and SNMP v3 user passwords in the imported configuration files. Enter
a string of 6 to 127 characters. Do not enter the following characters: !
# $ & < > ? ; ' | ` ~ \ % ^ ( )"
Note If you edit the encrypted sections in the configuration file
and try to import it, the edits will be ignored and the import
operation displays a partially successful message.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
153
Server Utilities
Generating Non Maskable Interrupts to the Host
Procedure
Actions Description
Generate NMI to drop-down list Allows you to select the server for which you want
to generate the non maskable interrupt (NMI). This
can be one of the following:
• Server 1
• Server 2
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
154
Server Utilities
Viewing Cisco IMC Last Reset Reason
Procedure
Name Description
Banner (80 Chars per line. Max Enter copyright information or messages that you want to display on
2K Chars.) field the login screen, before logging on to the Web UI or the command line
interface.
Restart SSH checkbox When checked, the active SSH sessions are terminated after you click
the Save Banner button.
What to do next
Name Description
Component field The component that was last reset.
Status field The reason why the component was last reset. This can be one of the
following:
• watchdog-reset—The watchdog-timer resets when the Cisco IMC
memory reaches full capacity.
• ac-cycle— PSU power cables are removed (no power input).
• graceful-reboot— Cisco IMC reboot occurs.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
155
Server Utilities
Downloading Hardware Inventory to a Local File
Name Description
Generate Inventory Data radio Cisco IMC displays this radio button when there is no hardware
button inventory data file to download.
Download to local file radio button Cisco IMC enables this radio button when a inventory data file is
available to download.
To download the existing file, select this option and click Download.
Step 5 Click Generate to create the data file. When data collection is complete, select the Download Inventory
Data to Local File radio button and click Download to download the file locally.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
156
Server Utilities
Exporting Hardware Inventory Data to a Remote Server
Name Description
Export Hardware Inventory Data The remote server type. This can be one of the following:
to drop-down list
• TFTP Server
• FTP Server
• SFTP Server
• SCP Server
• HTTP Server
Note If you chose SCP or SFTP as the remote server type while
performing this action, a pop-up window is displayed with
the message Server (RSA) key fingerprint is
<server_finger_print _ID> Do you wish to continue?. Click
Yes or No depending on the authenticity of the server
fingerprint.
The fingerprint is based on the host's public key and helps
you to identify or verify the host you are connecting to.
Server IP/Hostname field The IP address or hostname of the server on which the data file should
be stored. Depending on the setting in the Export Hardware Inventory
Data to drop-down list, the name of the field may vary.
Path and Filename field The path and filename Cisco IMC should use when exporting the file
to the remote server.
Username The username the system should use to log in to the remote server. This
field does not apply if the protocol is TFTP or HTTP.
Password The password for the remote server username. This field does not apply
if the protocol is TFTP or HTTP.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
157
Server Utilities
Exporting Hardware Inventory Data to a Remote Server
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
158
CHAPTER 15
Troubleshooting
This chapter includes the following sections:
• Recording the Last Boot Process, on page 159
• Recording the Last Crash, on page 160
• Downloading a DVR Player, on page 161
Step 4 (Optional) If you want to record the boot process until BIOS POST, then check Stop On BIOS POST
check-box.
Step 5 Click Save Changes
Step 6 On the tool bar above the Work pane, click Power On Server.
Step 7 In the Actions area, of the Bootstrap Process Recording pane, click Play Recording.
A confirmation dialog box with instructions on supported Java version appears.
Step 9 In the Actions area of the Bootstrap Process Recording area, click Download Recording.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
159
Troubleshooting
Recording the Last Crash
Step 10 Once the download is complete, you can select the file that you want play the video of the recording, and click
Open.
A DVR Player Controls window opens and plays the video of the selected file.
Step 6 Click Play Recording in the Actions area to view the recording of the operations that ran on the server.
A confirmation dialog box with instructions on supported Java version appears.
Step 8 In the Actions area of the Crash Recording area, click Download Recording.
Follow the instructions to download.
Note The file is saved in a .dvc format to a local drive. You can view this recording using KVM player
or an offline player. Every time you choose Download Recording option, the last crash process is
recorded, it autogenerate the file name, and save it in the path specified earlier.
Step 9 Once the download is complete, you can select the file that you want play the video of the recording, and click
Open.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
160
Troubleshooting
Downloading a DVR Player
A DVR Player Controls window opens and plays the video of the selected file.
Step 5 Extract the zip file. The zip file generally gets saved below the bootstrap file, and its name follows the format
offline.tgz
Step 6 Open the script file that you want to review the video recording.
Note If you want to play the recording for Windows, then ensure that the Java version running on your
system and in the script file are the same. If the Windows script file fails to play the recording, then
follow these steps:
Note Verification of Java version is required only for Windows OS. For Linux and MAC, the Java version
is picked automatically.
Step 7 Navigate to the folder in which these files are downloaded and open the script file that you want to play the
video recording.
The DVR player is launched, playing the video of the operations that ran on the server.
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
161
Troubleshooting
Downloading a DVR Player
Cisco UCS E-Series Integrated Management Controller GUI Configuration Guide, Release 3.2.2
162